1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horsena [70]
3 years ago
14

a pair of shoes is on sale for 15% off with this discount customers will pay $9 if they buy the shoes ​

Computers and Technology
1 answer:
Svetllana [295]3 years ago
7 0

Answer:

do 15% on a calculator then divide by 9

Explanation:

You might be interested in
The worst "review platform" (e.g. TripAdvisor, Zomato, Yelp) that can't be trusted?
BigorU [14]

I think it would be Zomato since its not popular and probably have bad and fake reviews.

4 0
3 years ago
I will make you brainless just answer all this question!!​
Taya2010 [7]

Answer:

I have make this question please answer this

Explanation:

#carryonlearning

8 0
3 years ago
A function that modifies an array by using pointer arithmetic such as ptr to process every value of the array should have a para
hammer [34]

Answer:

a. A nonconstant pointer to nonconstant data

Explanation:

Pointer can be used to pass an argument by reference. Pointers may be assigned to any integer value. Functions parameters are passed by an array. The function which modifies an array by arithmetic pointer is nonconstant pointer to nonconstant data to process every value in array. Pointer arithmetic allows us to perform integer additions or subtractions for the operation in pointer.

3 0
3 years ago
What is a software that allows the user to modify and redistribute?
lara31 [8.8K]
A software that does and allows this is free software
8 0
4 years ago
How computer viruses spread from one computer to another​
morpeh [17]
Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software.
8 0
3 years ago
Other questions:
  • James was having coffee and overhead a conversation between two men who talked about the fact that their friend could not find a
    10·1 answer
  • Jeff is preparing for a presentation on effective communication skills. He has to face an audience of over 50 people. Which stra
    9·2 answers
  • What standard linux utility is used to install and configure software on centos operating systems?
    8·1 answer
  • What is the purpose of filters in a database?
    15·1 answer
  • A group of computers that are interconnected order to share information or document is called a
    12·2 answers
  • Write a program which capitalize every character after full stopin a given sentence
    11·1 answer
  • List six parts of a computer system and which are output and which is an input device
    5·1 answer
  • What is the bit pattern (raw binary) of the single precision representation of the decimal number 0.125 following IEEE 754 stand
    9·1 answer
  • Please tell fast plzzzzzzzz​
    11·2 answers
  • Full form of computer
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!